Saturday, August 22, 2020
Quality Web Design
Quality Web Design (QWD) Security Weaknesses Steve Gelin Submitted to: Jack Sibrizzi SE571: Principles of Information Security and Privacy Keller Graduate School of Management Submitted: 8/25/2012 Table of Contents Executive Summary3 Company Overview3 Security Vulnerabilities3 Software Vulnerabilities4 Hardware Vulnerabilities4 Recommended Solutions5 A Hardware Example Solution5 A Software Example Solution5Impact on Business Processes5 Summary5 References6 Executive Summary My paper centers around a security evaluation of Quality Web Design (QWD), which is an exceptionally fruitful organization that is notable for its eminent and engaging sites; they take a shot at attempting to get your organization or business in the best 10 web index results so searchers discover you on the primary page of the hunt results.They have a serious estimating plan going on, they offer a wide range of alternatives for their site development, and they start by offering the client a choice of pre-planned s ites that they themselves can tweak with their individual logos, content, pictures, topics or only an entire diverse format and whatever other data that would be useful in getting the attention of potential clients. Organization OverviewQuality Web Design (QWD) is a business that determines and centers around Web website, Web advancement, content plan, programming, visual communication, photograph altering and logo structure for a wide range of organizations. QWD is a web visual depiction and advancement organization based out of Orlando, Fl. QWD take into account a gigantic and various customers that ranges across USA, UK and Canada. Security Vulnerabilities: Software Vulnerabilities Listed further down are two security vulnerabilities: programming and hardware.These security vulnerabilities were distinguished through the underlying check of the QWD programming utilization for their website architecture organization. A lion's share of QWD staff require out of office get to when chi pping away at ventures for the organization, so the utilization of Virtual Private Networks called (VPN’s), Outlook Web email, Microsoft SQL 2008 Server and Microsoft Exchange 2007 email servers which use the corporate intranet resources.Remotely using these projects or programming out of the organization will cause QWD to be presented to assaults from the web. Be that as it may, not just that, workers put the use of corporate gear, for example, work areas, workstations and cell phones (iPhones and Windows Mobile 6) in unsafe circumstances that the organization will pay for beyond a reasonable doubt later as time progress. Having these hardware recorded it is conceivable to acquire outside assaults from the web while using the organization intranet asset on a remote PC that isn't protected.As I’ve perused the diverse gear recorded inside the QWD organization it appears that there worker workstations, and cell phones are being utilized unprotected over the web which cou ld prompt circumstances, for example, Trojan ponies and email worms. For instance Microsoft Exchange 2007 email servers has a notable powerlessness that could permit remote code execution, this weakness can permit an assailant to assume responsibility for your influenced framework with Exchange Server administration account benefits or the aggressor could simply handicap your administrations inside Microsoft Exchange completely.Hardware Vulnerabilities The equivalent can be said for the organizations equipment frameworks recorded, for example, their iPhones and Windows Mobile 6, these equipment gadgets that workers of QWD are gadgets that can without much of a stretch be hacked by an outside client for instance the iPhone 4 has a defenselessness that permits a gatecrasher to have the option to act quietly and recover email messages, SMS messages, schedule arrangements, contact data, photographs, music documents, recordings, alongside some other information recorded by iPhone apps.Th e same can be said for their Windows Mobile 6 gadgets, there’s a surely understand issue with the Bluetooth work in all Windows Mobile 6 gadgets. This issue permits a person to peruse or compose any record that’s on your cell phone, even the Internet Explorer on Windows Mobile 6 and Windows Mobile 2003 for Smartphones permits assailants to cause a refusal of administration; which the aggressor at that point uses to penetrate your gadget to recover email messages, SMS messages, and schedule arrangements, contact data etc.From my examination the main workaround accommodated this weakness isn't to acknowledge matching nor association demands from obscure sources. So it would be better if the people who are utilizing gadgets with Windows Mobile 6 as their working framework ought to be careful and cautious about the things that they permit their gadgets to interface with. Suggested Solutions:For QWD the establishment of hostile to malware to ensure against pernicious applic ations, spyware, contaminated SD cards and malware-based assaults against their portable or equipment gadgets, for example, iPhones, workstations and so forth. Firmly uphold security approaches, for example, ordering the utilization of solid PINs/Passcodes, use SSL VPN customers to easily secure information in travel and guarantee fitting system verification and access rights at last bring together find and remote lock, wipe, reinforcement and reestablish offices for lost and taken devices.As for programming vulnerabilities the utilization of firewalls, on the two PCs and work areas, hostile to malware and spyware programs that will ensure against malignant exercises, refreshed programming patches with the most recent updates to security dangers, the utilization of solid passwords and pass keys, when sending data over the web whether grouped or unclassified he utilization of an encryption device to shield that data from being captured. Effect on Business Processes:As we as a whole k now as IT proficient, there can be a variety of effects that can influence work progress inside an organization, for example, secret key update updates, the cost that will be expected to actualize these new changes, what might be the security, rules and guidelines for these gadgets. Not exclusively will these new changes create turmoil for the initial barely any months of the switch up, they may likewise cause employee’s to feel distrustful of the idea that their framework could be undermined and that there being asked to continually refresh things inside their system.Summary: In outline this paper centers around the vulnerabilities of QWD as a Web Design and advancement organization, the product and equipment vulnerabilities of their framework and the required suggested answers for all gadgets, for example, their iPhones and Windows Mobile 6 usable gadgets. These gadgets left unchecked can make significant issues the organization if such things were assaulted and used to an aggressors advantage. QWD as an association must evaluate the circumstance with their product and equipment vulnerabilities and begin the best possible and required strides to counter these issues inside QWD.References: Degerstrom, J. (2011). Program Security and Quality Web Design. Recovered from http://www. jimdegerstrom. com/blog/2011/05/program security-and-quality-website architecture. html Lowe, S. (2009). Fix these basic vulnerabilities in Exchange Server. Recovered from http://www. techrepublic. om/blog/datacenter/fix these-basic vulnerabilities-in-return server/611 Hamell, D. (2010). Noxious Mobile Threats Report. Recovered from http://juniper. mwnewsroom. com/manual-discharges/2011/At-Riskâ€Global-Mobile-Threat-Study-Finds-Security Norman, G. (2009). Windows Mobile 6. 0 Users Beware of Bluetooth Vulnerability. Recovered from http://www. findmysoft. com/news/Windows-Mobile-6-0-and-6-1-Users-Beware-of-Bluetooth-Vulnerability/Greenberg, A. (2011). iPhone Security Bug. Reco vered from
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.